mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/01/13 18:30:07
This commit is contained in:
parent
b370a1da60
commit
864f987a79
55 changed files with 384 additions and 324 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "Win32k LPE vulnerability used in APT attack",
|
||||
"fork": false,
|
||||
"created_at": "2015-05-12T18:04:48Z",
|
||||
"updated_at": "2022-11-12T18:38:46Z",
|
||||
"updated_at": "2023-01-13T15:35:59Z",
|
||||
"pushed_at": "2017-12-18T14:11:29Z",
|
||||
"stargazers_count": 284,
|
||||
"watchers_count": 284,
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"has_discussions": false,
|
||||
"forks_count": 189,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 189,
|
||||
"watchers": 284,
|
||||
"watchers": 285,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-01-11T15:09:40Z",
|
||||
"updated_at": "2023-01-13T17:10:31Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1585,
|
||||
"watchers_count": 1585,
|
||||
"stargazers_count": 1584,
|
||||
"watchers_count": 1584,
|
||||
"has_discussions": false,
|
||||
"forks_count": 316,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 316,
|
||||
"watchers": 1585,
|
||||
"watchers": 1584,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel\/createFromParcel mismatch)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-03T09:04:50Z",
|
||||
"updated_at": "2023-01-13T12:13:21Z",
|
||||
"updated_at": "2023-01-13T12:35:54Z",
|
||||
"pushed_at": "2018-06-03T09:06:00Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-22T05:31:13Z",
|
||||
"updated_at": "2022-11-30T04:56:13Z",
|
||||
"updated_at": "2023-01-13T15:36:01Z",
|
||||
"pushed_at": "2018-02-25T08:49:07Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-01-11T15:09:40Z",
|
||||
"updated_at": "2023-01-13T17:10:31Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1585,
|
||||
"watchers_count": 1585,
|
||||
"stargazers_count": 1584,
|
||||
"watchers_count": 1584,
|
||||
"has_discussions": false,
|
||||
"forks_count": 316,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 316,
|
||||
"watchers": 1585,
|
||||
"watchers": 1584,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -564,13 +564,13 @@
|
|||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -568,10 +568,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-01-11T15:09:40Z",
|
||||
"updated_at": "2023-01-13T17:10:31Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1585,
|
||||
"watchers_count": 1585,
|
||||
"stargazers_count": 1584,
|
||||
"watchers_count": 1584,
|
||||
"has_discussions": false,
|
||||
"forks_count": 316,
|
||||
"allow_forking": true,
|
||||
|
@ -601,7 +601,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 316,
|
||||
"watchers": 1585,
|
||||
"watchers": 1584,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1590,10 +1590,10 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2022-12-29T22:42:26Z",
|
||||
"updated_at": "2023-01-13T17:10:28Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 874,
|
||||
"watchers_count": 874,
|
||||
"stargazers_count": 873,
|
||||
"watchers_count": 873,
|
||||
"has_discussions": false,
|
||||
"forks_count": 288,
|
||||
"allow_forking": true,
|
||||
|
@ -1602,7 +1602,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 288,
|
||||
"watchers": 874,
|
||||
"watchers": 873,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2848,10 +2848,10 @@
|
|||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2023-01-04T02:17:13Z",
|
||||
"updated_at": "2023-01-13T17:10:30Z",
|
||||
"pushed_at": "2021-02-06T00:24:21Z",
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"has_discussions": false,
|
||||
"forks_count": 77,
|
||||
"allow_forking": true,
|
||||
|
@ -2860,7 +2860,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 77,
|
||||
"watchers": 212,
|
||||
"watchers": 211,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3211,43 +3211,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 351340241,
|
||||
"name": "CVE-2019--0708-SCANNER",
|
||||
"full_name": "ORCA666\/CVE-2019--0708-SCANNER",
|
||||
"owner": {
|
||||
"login": "ORCA666",
|
||||
"id": 66519611,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66519611?v=4",
|
||||
"html_url": "https:\/\/github.com\/ORCA666"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ORCA666\/CVE-2019--0708-SCANNER",
|
||||
"description": "this is a local scanner for cve-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-25T07:05:38Z",
|
||||
"updated_at": "2022-06-30T13:50:49Z",
|
||||
"pushed_at": "2021-03-25T07:12:21Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"bluekeep",
|
||||
"cve-2019-0708",
|
||||
"exe",
|
||||
"local-scanner",
|
||||
"rdp",
|
||||
"scanner",
|
||||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 378511068,
|
||||
"name": "CVE-2019-0708",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Atlassian JIRA Template injection vulnerability RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-16T02:27:00Z",
|
||||
"updated_at": "2023-01-08T01:50:50Z",
|
||||
"updated_at": "2023-01-13T17:10:30Z",
|
||||
"pushed_at": "2019-07-22T06:47:52Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 89,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-13T16:34:03Z",
|
||||
"updated_at": "2023-01-13T07:56:24Z",
|
||||
"updated_at": "2023-01-13T17:10:31Z",
|
||||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"has_discussions": false,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 314,
|
||||
"watchers": 313,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for cve-2019-1458",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T17:55:07Z",
|
||||
"updated_at": "2023-01-08T20:19:34Z",
|
||||
"updated_at": "2023-01-13T16:39:44Z",
|
||||
"pushed_at": "2022-01-17T19:45:41Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 164,
|
||||
"watchers": 165,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-27T19:32:07Z",
|
||||
"updated_at": "2022-11-26T00:41:45Z",
|
||||
"updated_at": "2023-01-13T17:10:35Z",
|
||||
"pushed_at": "2020-08-27T19:33:42Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 48,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-01-12T08:55:04Z",
|
||||
"updated_at": "2023-01-13T17:10:33Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3656,
|
||||
"watchers_count": 3656,
|
||||
"stargazers_count": 3655,
|
||||
"watchers_count": 3655,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1052,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1052,
|
||||
"watchers": 3656,
|
||||
"watchers": 3655,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"cve-2019-18426"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2022-12-07T07:48:09Z",
|
||||
"updated_at": "2023-01-13T17:10:29Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 847,
|
||||
"watchers_count": 847,
|
||||
"stargazers_count": 846,
|
||||
"watchers_count": 846,
|
||||
"has_discussions": false,
|
||||
"forks_count": 173,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 173,
|
||||
"watchers": 847,
|
||||
"watchers": 846,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -187,10 +187,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-01-11T15:09:40Z",
|
||||
"updated_at": "2023-01-13T17:10:31Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1585,
|
||||
"watchers_count": 1585,
|
||||
"stargazers_count": 1584,
|
||||
"watchers_count": 1584,
|
||||
"has_discussions": false,
|
||||
"forks_count": 316,
|
||||
"allow_forking": true,
|
||||
|
@ -220,7 +220,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 316,
|
||||
"watchers": 1585,
|
||||
"watchers": 1584,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -134,10 +134,10 @@
|
|||
"description": "Confluence 未授权 RCE (CVE-2019-3396) 漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T02:22:24Z",
|
||||
"updated_at": "2023-01-05T08:42:24Z",
|
||||
"updated_at": "2023-01-13T17:10:28Z",
|
||||
"pushed_at": "2019-11-01T14:33:21Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"has_discussions": false,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
|
@ -146,7 +146,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 64,
|
||||
"watchers": 144,
|
||||
"watchers": 143,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -253,10 +253,10 @@
|
|||
"description": "Ruby on Rails是一个 Web 应用程序框架,是一个相对较新的 Web 应用程序框架,构建在 Ruby 语言之上。这个漏洞主要是由于Ruby on Rails使用了指定参数的render file来渲染应用之外的视图,我们可以通过修改访问某控制器的请求包,通过“…\/…\/…\/…\/”来达到路径穿越的目的,然后再通过“{{”来进行模板查询路径的闭合,使得所要访问的文件被当做外部模板来解析。",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-17T09:04:43Z",
|
||||
"updated_at": "2022-10-18T01:08:22Z",
|
||||
"updated_at": "2023-01-13T12:24:23Z",
|
||||
"pushed_at": "2022-10-17T09:17:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -265,7 +265,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2022-12-27T16:37:27Z",
|
||||
"updated_at": "2023-01-13T17:10:32Z",
|
||||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"stargazers_count": 254,
|
||||
"watchers_count": 254,
|
||||
"has_discussions": false,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 255,
|
||||
"watchers": 254,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2022-12-22T12:51:29Z",
|
||||
"updated_at": "2023-01-13T17:10:34Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 650,
|
||||
"watchers_count": 650,
|
||||
"stargazers_count": 649,
|
||||
"watchers_count": 649,
|
||||
"has_discussions": false,
|
||||
"forks_count": 171,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 171,
|
||||
"watchers": 650,
|
||||
"watchers": 649,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2022-12-27T16:37:24Z",
|
||||
"updated_at": "2023-01-13T17:10:33Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"stargazers_count": 628,
|
||||
"watchers_count": 628,
|
||||
"has_discussions": false,
|
||||
"forks_count": 205,
|
||||
"allow_forking": true,
|
||||
|
@ -114,7 +114,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 205,
|
||||
"watchers": 629,
|
||||
"watchers": 628,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1032,10 +1032,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2022-12-30T11:25:53Z",
|
||||
"updated_at": "2023-01-13T17:10:33Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1228,
|
||||
"watchers_count": 1228,
|
||||
"stargazers_count": 1227,
|
||||
"watchers_count": 1227,
|
||||
"has_discussions": false,
|
||||
"forks_count": 370,
|
||||
"allow_forking": true,
|
||||
|
@ -1050,7 +1050,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 370,
|
||||
"watchers": 1228,
|
||||
"watchers": 1227,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1369,10 +1369,10 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2022-12-29T17:27:52Z",
|
||||
"updated_at": "2023-01-13T17:10:33Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 481,
|
||||
"watchers_count": 481,
|
||||
"stargazers_count": 480,
|
||||
"watchers_count": 480,
|
||||
"has_discussions": false,
|
||||
"forks_count": 156,
|
||||
"allow_forking": true,
|
||||
|
@ -1387,7 +1387,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 156,
|
||||
"watchers": 481,
|
||||
"watchers": 480,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1636,10 +1636,10 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2022-12-24T22:49:53Z",
|
||||
"updated_at": "2023-01-13T17:10:34Z",
|
||||
"pushed_at": "2022-03-30T14:02:04Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -1648,7 +1648,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 207,
|
||||
"watchers": 206,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1917,40 +1917,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 328551475,
|
||||
"name": "CVE-2020-0796",
|
||||
"full_name": "ORCA666\/CVE-2020-0796",
|
||||
"owner": {
|
||||
"login": "ORCA666",
|
||||
"id": 66519611,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66519611?v=4",
|
||||
"html_url": "https:\/\/github.com\/ORCA666"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ORCA666\/CVE-2020-0796",
|
||||
"description": "local exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-11T04:48:26Z",
|
||||
"updated_at": "2022-06-10T10:41:17Z",
|
||||
"pushed_at": "2021-05-31T16:20:17Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2020-0796",
|
||||
"exploit",
|
||||
"local-exploits",
|
||||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 385839527,
|
||||
"name": "CVE-2020-0796-Scanner",
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2023-01-11T08:16:47Z",
|
||||
"updated_at": "2023-01-13T17:10:36Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1543,
|
||||
"watchers_count": 1543,
|
||||
"stargazers_count": 1542,
|
||||
"watchers_count": 1542,
|
||||
"has_discussions": false,
|
||||
"forks_count": 352,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 352,
|
||||
"watchers": 1543,
|
||||
"watchers": 1542,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-01-12T08:55:04Z",
|
||||
"updated_at": "2023-01-13T17:10:33Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3656,
|
||||
"watchers_count": 3656,
|
||||
"stargazers_count": 3655,
|
||||
"watchers_count": 3655,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1052,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1052,
|
||||
"watchers": 3656,
|
||||
"watchers": 3655,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T04:38:24Z",
|
||||
"updated_at": "2023-01-11T23:23:39Z",
|
||||
"updated_at": "2023-01-13T17:10:40Z",
|
||||
"pushed_at": "2022-04-14T03:17:44Z",
|
||||
"stargazers_count": 356,
|
||||
"watchers_count": 356,
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 356,
|
||||
"watchers": 355,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-01-11T15:09:40Z",
|
||||
"updated_at": "2023-01-13T17:10:31Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1585,
|
||||
"watchers_count": 1585,
|
||||
"stargazers_count": 1584,
|
||||
"watchers_count": 1584,
|
||||
"has_discussions": false,
|
||||
"forks_count": 316,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 316,
|
||||
"watchers": 1585,
|
||||
"watchers": 1584,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-29T10:14:32Z",
|
||||
"updated_at": "2023-01-13T11:36:14Z",
|
||||
"updated_at": "2023-01-13T17:45:08Z",
|
||||
"pushed_at": "2022-03-03T17:50:03Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 54,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2023-01-05T12:09:14Z",
|
||||
"updated_at": "2023-01-13T17:10:40Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1648,
|
||||
"watchers_count": 1648,
|
||||
"stargazers_count": 1647,
|
||||
"watchers_count": 1647,
|
||||
"has_discussions": false,
|
||||
"forks_count": 584,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 584,
|
||||
"watchers": 1648,
|
||||
"watchers": 1647,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-23T08:21:54Z",
|
||||
"updated_at": "2022-11-29T00:14:59Z",
|
||||
"updated_at": "2023-01-13T17:10:39Z",
|
||||
"pushed_at": "2021-04-23T08:28:53Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -141,7 +141,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 64,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-29T13:07:14Z",
|
||||
"updated_at": "2022-12-09T21:09:21Z",
|
||||
"updated_at": "2023-01-13T17:10:39Z",
|
||||
"pushed_at": "2022-01-16T04:17:08Z",
|
||||
"stargazers_count": 204,
|
||||
"watchers_count": 204,
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 204,
|
||||
"watchers": 203,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T14:41:25Z",
|
||||
"updated_at": "2022-12-24T13:36:12Z",
|
||||
"updated_at": "2023-01-13T14:25:19Z",
|
||||
"pushed_at": "2021-02-15T15:11:00Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-07T11:10:40Z",
|
||||
"updated_at": "2022-12-14T16:58:53Z",
|
||||
"updated_at": "2023-01-13T17:10:39Z",
|
||||
"pushed_at": "2021-04-15T12:46:54Z",
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 220,
|
||||
"watchers": 219,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -319,10 +319,10 @@
|
|||
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T11:54:32Z",
|
||||
"updated_at": "2022-12-26T00:03:27Z",
|
||||
"updated_at": "2023-01-13T17:10:39Z",
|
||||
"pushed_at": "2022-03-02T15:41:29Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -339,7 +339,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 145,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -450,10 +450,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T16:54:39Z",
|
||||
"updated_at": "2022-11-24T11:13:53Z",
|
||||
"updated_at": "2023-01-13T17:10:39Z",
|
||||
"pushed_at": "2021-03-09T16:56:09Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
|
@ -462,7 +462,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 95,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -819,10 +819,10 @@
|
|||
"description": "ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-16T07:31:25Z",
|
||||
"updated_at": "2022-11-04T22:30:28Z",
|
||||
"updated_at": "2023-01-13T17:10:39Z",
|
||||
"pushed_at": "2021-05-01T17:20:15Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -831,7 +831,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 32,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2021/CVE-2021-268855.json
Normal file
31
2021/CVE-2021-268855.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 573157644,
|
||||
"name": "CVE-2021-268855",
|
||||
"full_name": "sikkertech\/CVE-2021-268855",
|
||||
"owner": {
|
||||
"login": "sikkertech",
|
||||
"id": 74667436,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74667436?v=4",
|
||||
"html_url": "https:\/\/github.com\/sikkertech"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sikkertech\/CVE-2021-268855",
|
||||
"description": "Exploiting Microsoft CVE-2021-268855 in Exchange (Getting RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-01T20:30:56Z",
|
||||
"updated_at": "2023-01-13T18:04:46Z",
|
||||
"pushed_at": "2022-12-01T20:39:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-15T06:40:49Z",
|
||||
"updated_at": "2022-12-15T02:33:35Z",
|
||||
"updated_at": "2023-01-13T15:22:44Z",
|
||||
"pushed_at": "2021-12-08T03:06:43Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2023-01-06T05:20:13Z",
|
||||
"updated_at": "2023-01-13T17:10:39Z",
|
||||
"pushed_at": "2021-06-12T08:27:09Z",
|
||||
"stargazers_count": 820,
|
||||
"watchers_count": 820,
|
||||
"stargazers_count": 819,
|
||||
"watchers_count": 819,
|
||||
"has_discussions": false,
|
||||
"forks_count": 137,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 137,
|
||||
"watchers": 820,
|
||||
"watchers": 819,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -397,10 +397,10 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2023-01-13T09:13:39Z",
|
||||
"updated_at": "2023-01-13T17:10:37Z",
|
||||
"pushed_at": "2022-04-14T11:51:18Z",
|
||||
"stargazers_count": 431,
|
||||
"watchers_count": 431,
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"has_discussions": false,
|
||||
"forks_count": 120,
|
||||
"allow_forking": true,
|
||||
|
@ -409,7 +409,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 120,
|
||||
"watchers": 431,
|
||||
"watchers": 430,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -460,13 +460,13 @@
|
|||
"stargazers_count": 852,
|
||||
"watchers_count": 852,
|
||||
"has_discussions": false,
|
||||
"forks_count": 239,
|
||||
"forks_count": 240,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 239,
|
||||
"forks": 240,
|
||||
"watchers": 852,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-09T15:44:00Z",
|
||||
"updated_at": "2022-08-23T13:04:22Z",
|
||||
"updated_at": "2023-01-13T17:10:40Z",
|
||||
"pushed_at": "2021-06-26T18:31:23Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 55,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -49,10 +49,10 @@
|
|||
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T20:13:49Z",
|
||||
"updated_at": "2022-12-22T12:01:43Z",
|
||||
"updated_at": "2023-01-13T17:10:40Z",
|
||||
"pushed_at": "2022-12-07T12:52:32Z",
|
||||
"stargazers_count": 705,
|
||||
"watchers_count": 705,
|
||||
"stargazers_count": 704,
|
||||
"watchers_count": 704,
|
||||
"has_discussions": false,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 705,
|
||||
"watchers": 704,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -134,10 +134,10 @@
|
|||
"description": "C# PoC for CVE-2021-36934\/HiveNightmare\/SeriousSAM",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-24T12:55:05Z",
|
||||
"updated_at": "2022-12-21T11:15:02Z",
|
||||
"updated_at": "2023-01-13T17:10:41Z",
|
||||
"pushed_at": "2021-09-15T12:41:32Z",
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -146,7 +146,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 266,
|
||||
"watchers": 265,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-16T16:36:48Z",
|
||||
"updated_at": "2023-01-13T12:11:42Z",
|
||||
"updated_at": "2023-01-13T12:35:46Z",
|
||||
"pushed_at": "2022-04-16T16:37:23Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -169,7 +169,7 @@
|
|||
"stargazers_count": 939,
|
||||
"watchers_count": 939,
|
||||
"has_discussions": false,
|
||||
"forks_count": 310,
|
||||
"forks_count": 309,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -179,7 +179,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 310,
|
||||
"forks": 309,
|
||||
"watchers": 939,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -477,10 +477,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2023-01-12T22:50:09Z",
|
||||
"updated_at": "2023-01-13T12:42:08Z",
|
||||
"pushed_at": "2022-06-22T20:21:42Z",
|
||||
"stargazers_count": 727,
|
||||
"watchers_count": 727,
|
||||
"stargazers_count": 728,
|
||||
"watchers_count": 728,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
|
@ -496,7 +496,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 727,
|
||||
"watchers": 728,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -8895,10 +8895,10 @@
|
|||
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T15:22:50Z",
|
||||
"updated_at": "2023-01-07T16:23:34Z",
|
||||
"updated_at": "2023-01-13T14:43:47Z",
|
||||
"pushed_at": "2022-12-30T12:32:05Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -8907,7 +8907,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -9585,10 +9585,10 @@
|
|||
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-24T13:18:49Z",
|
||||
"updated_at": "2023-01-02T23:33:43Z",
|
||||
"updated_at": "2023-01-13T17:53:09Z",
|
||||
"pushed_at": "2022-08-12T20:12:50Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -9597,7 +9597,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 96,
|
||||
"watchers": 97,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:24:51Z",
|
||||
"updated_at": "2023-01-13T12:12:40Z",
|
||||
"updated_at": "2023-01-13T15:36:35Z",
|
||||
"pushed_at": "2023-01-10T16:25:49Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 91,
|
||||
"forks": 18,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2023-01-13T09:48:49Z",
|
||||
"updated_at": "2023-01-13T13:01:16Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 678,
|
||||
"watchers_count": 678,
|
||||
"stargazers_count": 679,
|
||||
"watchers_count": 679,
|
||||
"has_discussions": false,
|
||||
"forks_count": 144,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 144,
|
||||
"watchers": 678,
|
||||
"watchers": 679,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -187,10 +187,10 @@
|
|||
"description": "CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-03T19:24:30Z",
|
||||
"updated_at": "2022-11-30T04:48:11Z",
|
||||
"updated_at": "2023-01-13T12:49:04Z",
|
||||
"pushed_at": "2022-06-03T19:59:01Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -199,7 +199,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2279,5 +2279,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 588668068,
|
||||
"name": "Follina_Vagrant",
|
||||
"full_name": "3barz\/Follina_Vagrant",
|
||||
"owner": {
|
||||
"login": "3barz",
|
||||
"id": 113859310,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113859310?v=4",
|
||||
"html_url": "https:\/\/github.com\/3barz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/3barz\/Follina_Vagrant",
|
||||
"description": "Follina(CVE-2022-30190) Vagrant Demo",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-13T17:32:13Z",
|
||||
"updated_at": "2023-01-13T17:36:25Z",
|
||||
"pushed_at": "2023-01-13T17:36:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC ",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-09T04:27:15Z",
|
||||
"updated_at": "2023-01-13T05:09:35Z",
|
||||
"updated_at": "2023-01-13T17:16:25Z",
|
||||
"pushed_at": "2023-01-09T08:19:27Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-13T03:26:14Z",
|
||||
"updated_at": "2023-01-13T10:19:09Z",
|
||||
"updated_at": "2023-01-13T16:31:21Z",
|
||||
"pushed_at": "2023-01-13T03:35:05Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -86,6 +86,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 573162752,
|
||||
"name": "CVE-2022-41082",
|
||||
"full_name": "sikkertech\/CVE-2022-41082",
|
||||
"owner": {
|
||||
"login": "sikkertech",
|
||||
"id": 74667436,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74667436?v=4",
|
||||
"html_url": "https:\/\/github.com\/sikkertech"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sikkertech\/CVE-2022-41082",
|
||||
"description": "Exchange CVE '22",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-01T20:48:53Z",
|
||||
"updated_at": "2023-01-13T18:05:11Z",
|
||||
"pushed_at": "2022-12-01T20:50:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 581104837,
|
||||
"name": "OWASSRF-CVE-2022-41082-POC",
|
||||
|
@ -100,10 +129,10 @@
|
|||
"description": "PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-22T09:35:26Z",
|
||||
"updated_at": "2023-01-13T08:59:46Z",
|
||||
"updated_at": "2023-01-13T14:38:55Z",
|
||||
"pushed_at": "2023-01-10T08:09:36Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -120,7 +149,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 30,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2022/CVE-2022-41828.json
Normal file
31
2022/CVE-2022-41828.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 576236390,
|
||||
"name": "CVE-2022-41828",
|
||||
"full_name": "murataydemir\/CVE-2022-41828",
|
||||
"owner": {
|
||||
"login": "murataydemir",
|
||||
"id": 16391655,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
|
||||
"html_url": "https:\/\/github.com\/murataydemir"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2022-41828",
|
||||
"description": "[CVE-2022-41828] Amazon AWS Redshift JDBC Driver Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-09T10:35:33Z",
|
||||
"updated_at": "2023-01-13T14:31:20Z",
|
||||
"pushed_at": "2023-01-13T09:00:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -76,7 +76,7 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -90,7 +90,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -145,13 +145,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-11-16T16:26:34Z",
|
||||
"updated_at": "2023-01-11T10:12:05Z",
|
||||
"pushed_at": "2023-01-11T09:13:55Z",
|
||||
"pushed_at": "2023-01-13T15:41:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-17T16:45:24Z",
|
||||
"updated_at": "2023-01-12T15:49:49Z",
|
||||
"updated_at": "2023-01-13T16:16:15Z",
|
||||
"pushed_at": "2022-12-21T17:53:19Z",
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 235,
|
||||
"watchers": 236,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -43,7 +43,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-12-26T00:08:55Z",
|
||||
"updated_at": "2023-01-11T11:03:33Z",
|
||||
"pushed_at": "2023-01-04T02:01:53Z",
|
||||
"pushed_at": "2023-01-13T18:26:06Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
|
@ -71,19 +71,19 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-01-13T11:26:07Z",
|
||||
"updated_at": "2023-01-13T18:08:48Z",
|
||||
"pushed_at": "2023-01-06T06:31:57Z",
|
||||
"stargazers_count": 603,
|
||||
"watchers_count": 603,
|
||||
"stargazers_count": 605,
|
||||
"watchers_count": 605,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 603,
|
||||
"forks": 40,
|
||||
"watchers": 605,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -130,7 +130,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-01-03T21:46:37Z",
|
||||
"updated_at": "2023-01-13T10:12:19Z",
|
||||
"pushed_at": "2023-01-04T02:03:17Z",
|
||||
"pushed_at": "2023-01-13T18:24:29Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
|
@ -159,7 +159,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-01-04T05:08:20Z",
|
||||
"updated_at": "2023-01-10T15:04:48Z",
|
||||
"pushed_at": "2023-01-04T05:32:52Z",
|
||||
"pushed_at": "2023-01-13T18:23:51Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
|
@ -192,7 +192,7 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -203,7 +203,7 @@
|
|||
"swift"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -222,7 +222,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-01-05T21:50:25Z",
|
||||
"updated_at": "2023-01-13T09:34:02Z",
|
||||
"pushed_at": "2023-01-13T09:30:17Z",
|
||||
"pushed_at": "2023-01-13T18:22:32Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
|
@ -252,10 +252,10 @@
|
|||
"description": "Simple customization app using CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-12T14:31:30Z",
|
||||
"updated_at": "2023-01-12T17:06:38Z",
|
||||
"updated_at": "2023-01-13T14:00:39Z",
|
||||
"pushed_at": "2023-01-12T19:14:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -264,7 +264,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T15:59:26Z",
|
||||
"updated_at": "2023-01-13T12:19:49Z",
|
||||
"updated_at": "2023-01-13T18:04:12Z",
|
||||
"pushed_at": "2023-01-13T09:01:20Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 151,
|
||||
"forks": 31,
|
||||
"watchers": 158,
|
||||
"score": 0
|
||||
}
|
||||
]
|
15
README.md
15
README.md
|
@ -3249,6 +3249,7 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi
|
|||
- [0xAbbarhSF/FollinaXploit](https://github.com/0xAbbarhSF/FollinaXploit)
|
||||
- [kevinsmith96/Cve-2022-30190](https://github.com/kevinsmith96/Cve-2022-30190)
|
||||
- [melting0256/Enterprise-Cybersecurity](https://github.com/melting0256/Enterprise-Cybersecurity)
|
||||
- [3barz/Follina_Vagrant](https://github.com/3barz/Follina_Vagrant)
|
||||
|
||||
### CVE-2022-30206 (2022-07-12)
|
||||
|
||||
|
@ -4607,6 +4608,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability.
|
|||
- [Diverto/nse-exchange](https://github.com/Diverto/nse-exchange)
|
||||
- [trhacknon/CVE-2022-41082-MASS-SCANNER](https://github.com/trhacknon/CVE-2022-41082-MASS-SCANNER)
|
||||
- [notareaperbutDR34P3r/http-vuln-CVE-2022-41082](https://github.com/notareaperbutDR34P3r/http-vuln-CVE-2022-41082)
|
||||
- [sikkertech/CVE-2022-41082](https://github.com/sikkertech/CVE-2022-41082)
|
||||
- [balki97/OWASSRF-CVE-2022-41082-POC](https://github.com/balki97/OWASSRF-CVE-2022-41082-POC)
|
||||
|
||||
### CVE-2022-41218 (2022-09-21)
|
||||
|
@ -4699,6 +4701,14 @@ An attacker can cause excessive memory growth in a Go server accepting HTTP/2 re
|
|||
|
||||
- [domdom82/h2conn-exploit](https://github.com/domdom82/h2conn-exploit)
|
||||
|
||||
### CVE-2022-41828 (2022-09-29)
|
||||
|
||||
<code>
|
||||
In Amazon AWS Redshift JDBC Driver (aka amazon-redshift-jdbc-driver or redshift-jdbc42) before 2.1.0.8, the Object Factory does not check the class type when instantiating an object from a class name.
|
||||
</code>
|
||||
|
||||
- [murataydemir/CVE-2022-41828](https://github.com/murataydemir/CVE-2022-41828)
|
||||
|
||||
### CVE-2022-41852
|
||||
- [Warxim/CVE-2022-41852](https://github.com/Warxim/CVE-2022-41852)
|
||||
|
||||
|
@ -11716,6 +11726,9 @@ Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclos
|
|||
|
||||
- [malakkf/CVE-2021-46702](https://github.com/malakkf/CVE-2021-46702)
|
||||
|
||||
### CVE-2021-268855
|
||||
- [sikkertech/CVE-2021-268855](https://github.com/sikkertech/CVE-2021-268855)
|
||||
|
||||
|
||||
## 2020
|
||||
### CVE-2020-0001 (2020-01-08)
|
||||
|
@ -12419,7 +12432,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [AaronCaiii/CVE-2020-0796-POC](https://github.com/AaronCaiii/CVE-2020-0796-POC)
|
||||
- [datntsec/CVE-2020-0796](https://github.com/datntsec/CVE-2020-0796)
|
||||
- [MasterSploit/LPE---CVE-2020-0796](https://github.com/MasterSploit/LPE---CVE-2020-0796)
|
||||
- [ORCA666/CVE-2020-0796](https://github.com/ORCA666/CVE-2020-0796)
|
||||
- [1stPeak/CVE-2020-0796-Scanner](https://github.com/1stPeak/CVE-2020-0796-Scanner)
|
||||
- [Anonimo501/SMBGhost_CVE-2020-0796_checker](https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker)
|
||||
- [Opensitoo/cve-2020-0796](https://github.com/Opensitoo/cve-2020-0796)
|
||||
|
@ -17370,7 +17382,6 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
|
|||
- [AaronCaiii/CVE-2019-0708-POC](https://github.com/AaronCaiii/CVE-2019-0708-POC)
|
||||
- [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
|
||||
- [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows)
|
||||
- [ORCA666/CVE-2019--0708-SCANNER](https://github.com/ORCA666/CVE-2019--0708-SCANNER)
|
||||
- [FroydCod3r/CVE-2019-0708](https://github.com/FroydCod3r/CVE-2019-0708)
|
||||
- [pywc/CVE-2019-0708](https://github.com/pywc/CVE-2019-0708)
|
||||
- [bibo318/kali-CVE-2019-0708-lab](https://github.com/bibo318/kali-CVE-2019-0708-lab)
|
||||
|
|
Loading…
Add table
Reference in a new issue